Advance Computer Network Assignment
Advance Computer Network Assignment
SEMESTER II
ROLL NO 2314515632
1) a) The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission
Control Protocol/Internet Protocol) reference model are two fundamental frameworks
for understanding network communication.
OSI Model:
Layers: Consists of seven layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
Functionality: Provides a detailed and granular approach to network
interactions. Each layer has specific functions, such as error handling (Data
Link), path determination (Network), and session management (Session).
Development: Conceptualized by the International Organization for
Standardization (ISO) as a theoretical framework.
Flexibility: Protocol-independent; serves as a universal set of standards.
Usage: More of a teaching and theoretical model, rarely used directly in network
implementations.
TCP/IP Model:
Layers: Consists of four layers: Link, Internet, Transport, and Application.
Functionality: More pragmatic and directly aligned with the protocols used in
the internet. For instance, the Internet layer corresponds to the Network layer in
OSI, using protocols like IP for routing.
Development: Developed by the U.S. Department of Defense to create a robust,
fault-tolerant network communication framework.
Flexibility: Protocol-specific; built around the suite of TCP/IP protocols.
Usage: Widely used in practical implementations and forms the foundation of
the modern internet.
Layering Concept: Both models use a layered approach to simplify the complex
process of networking by breaking it down into manageable pieces.
Modularization: Both models facilitate troubleshooting, protocol design, and
understanding by compartmentalizing functions.
Differences:
Granularity: OSI has seven layers, offering more granularity, while TCP/IP has
four layers.
Development Purpose: OSI was developed as a theoretical guide, whereas
TCP/IP was designed for practical implementation.
Protocol Dependency: OSI is protocol-agnostic, while TCP/IP is closely tied to
the protocols within its suite.
1) b) Ethernet and Token Ring are two distinct LAN technologies that differ significantly
in their architectures and access methods.
Ethernet uses a bus or star topology and employs Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) as its access method. In Ethernet, devices listen for
network traffic before transmitting. If the channel is clear, they send data. If a collision
occurs, devices stop transmitting, wait for a random time, and retry. This method is
decentralized and allows for flexible network expansion, but can lead to increased
collisions and reduced efficiency in high-traffic situations.
Token Ring, developed by IBM, uses a ring topology where data circulates in one
direction. It employs a token-passing access method. A special packet called a token
circulates the network, and only the device holding the token can transmit data. Once
transmission is complete, the token is released for the next device. This method
provides deterministic access times and efficient performance under heavy loads, but
can be less efficient with light traffic due to token overhead.
Ethernet has become the dominant LAN technology due to its simplicity, cost-
effectiveness, and ability to evolve to higher speeds. Token Ring, while offering
advantages in certain scenarios, has largely fallen out of use due to higher costs and
limited scalability. The choice between these technologies historically depended on
factors such as network size, traffic patterns, and specific application requirements.
Bus Topology: All devices connect to a single cable, called the bus. Data travels
along this cable, and each device checks if the data is intended for it. While
simple and cost-effective, it's vulnerable to single points of failure.
Star Topology: Devices connect to a central hub or switch. All communication
passes through this central point, which can be both an advantage (easy
management) and a disadvantage (single point of failure).
Ring Topology: Devices are connected in a circular pattern, with each device
linked to two others. Data travels in one direction around the ring. It's efficient
but can be disrupted if one connection fails.
Mesh Topology: Every device is connected to every other device. This provides
redundancy and fault tolerance but is complex and expensive to implement.
Partial mesh topologies, where only some devices have multiple connections,
are more common.
Tree Topology: A hierarchical structure where a root node connects to lower-
level nodes, which in turn connect to even lower levels. It's scalable and
manageable but can suffer if the root node fails.
Hybrid Topology: Combines two or more different topologies to meet specific
network requirements. For example, a star-bus topology combines elements of
both star and bus topologies.
Each topology has its advantages and disadvantages in terms of cost, reliability,
scalability, and performance. The choice depends on factors like network size, purpose,
budget, and required reliability. Modern networks often use combinations of these
topologies to leverage their respective strengths.
3) a) The Internet Protocol (IP) and Transmission Control Protocol (TCP) are fundamental
components of the TCP/IP suite, which forms the basis of internet communication.
IP operates at the network layer of the OSI model. Its primary function is to handle
addressing and routing of data packets across networks. IP assigns unique addresses (IP
addresses) to devices on a network, allowing them to be identified and located. It also
determines the best path for data packets to travel from source to destination, potentially
across multiple networks. IP is connectionless and doesn't guarantee delivery or proper
sequencing of packets.
TCP, on the other hand, operates at the transport layer. It provides reliable, ordered, and
error-checked delivery of data between applications running on hosts communicating
over an IP network. TCP achieves this through several mechanisms:
Together, TCP and IP form a powerful combination. IP handles the routing of data
across networks, while TCP ensures that the data arrives completely and in the correct
order. This abstraction allows application developers to focus on their specific tasks
without worrying about the complexities of network communication.
While alternatives exist (like UDP for faster, less reliable communication), TCP/IP
remains the backbone of most internet communications due to its reliability and
widespread adoption.
3) b) Circuit switching and packet switching are two fundamental methods of data
transmission in telecommunications networks.
Circuit switching establishes a dedicated physical path between the sender and receiver
for the duration of the communication. This path remains exclusive to that connection
until it's terminated. Traditional telephone networks primarily use this method.
Advantages of circuit switching include:
Packet switching, in contrast, breaks data into smaller packets, each routed
independently through the network. The Internet primarily uses this method.
Advantages of packet switching include:
In modern networks, packet switching dominates due to its efficiency and flexibility,
especially for data communications. However, circuit switching still finds use in
scenarios requiring guaranteed quality of service, like some real-time applications.
Hybrid approaches also exist, combining elements of both to leverage their respective
strengths for specific use cases.
4) a) Border Gateway Protocol (BGP) is the primary protocol for inter-domain routing on
the Internet, facilitating communication between different autonomous systems (AS).
BGP operates as a path-vector protocol, exchanging routing information between BGP
speakers (routers) in different AS. Unlike intra-domain protocols that focus on finding
the shortest path within a network, BGP's primary concern is policy-based routing
between networks.
Scope: BGP operates between AS, while OSPF and RIP work within a single
AS.
Scalability: BGP is designed to handle the massive scale of the Internet, unlike
intra-domain protocols.
Metrics: BGP uses multiple attributes for path selection, whereas OSPF uses
cost and RIP uses hop count.
Convergence: BGP converges slower but is more stable, while OSPF and RIP
converge faster but may be less stable in large networks.
Policy control: BGP allows extensive policy-based routing decisions, which is
limited in OSPF and RIP.
Protocol type: BGP is path-vector, OSPF is link-state, and RIP is distance-
vector.
While ISDN technology has been largely superseded by newer broadband technologies
in many areas, it still finds use in specific applications, particularly in telephony and as
a backup for other communication systems.
Physical Layer: Handles the transmission of bits over the physical medium.
ATM Layer: Responsible for cell switching and multiplexing. It manages cell
header generation/extraction, cell routing, and traffic management.
ATM Adaptation Layer (AAL): Adapts higher-layer protocols to the ATM layer,
segmenting data into cells and reassembling them at the destination.
ATM uses fixed-size 53-byte cells (48 bytes payload, 5 bytes header) for all
communications, allowing for efficient switching and multiplexing.
Virtual Channel Connections (VCCs) in ATM networks are established through a
process involving several steps:
Signaling: The source node sends a setup message specifying the destination
and required Quality of Service (QoS) parameters.
Route Selection: The network determines the best path based on available
resources and QoS requirements.
Resource Allocation: Network switches along the chosen path allocate
necessary resources (bandwidth, buffers) for the connection.
Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) Assignment:
Each switch assigns unique VPI/VCI values for the connection on its input and
output ports.
Connection Table Update: Switches update their connection tables with the new
VPI/VCI mappings.
Confirmation: The destination node sends a confirmation message back to the
source.
Data Transfer: Once established, data can flow through the VCC.
6) a) Web security is crucial for protecting sensitive information transmitted over the
Internet. Key requirements include:
Secure Socket Layer (SSL), and its successor Transport Layer Security (TLS), play a
vital role in meeting these requirements. SSL/TLS operates between the application and
transport layers, providing a secure channel for communication.
Key generation: Creating large prime numbers to derive public and private keys.
Encryption: Using the recipient's public key to encrypt messages.
Decryption: Using the recipient's private key to decrypt messages.
RSA's security relies on the difficulty of factoring large numbers. The public key can
be freely distributed, while the private key remains secret. This allows for secure
communication without prior key exchange, making it suitable for various applications,
including digital signatures and secure data transmission.